Attribute-based encryption for fine-grained access control of encrypted data

V Goyal, O Pandey, A Sahai, B Waters - … of the 13th ACM conference on …, 2006 - dl.acm.org
As more sensitive data is shared and stored by third-party sites on the Internet, there will be
a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can …

Ciphertext-policy attribute-based encryption

J Bethencourt, A Sahai, B Waters - 2007 IEEE symposium on …, 2007 - ieeexplore.ieee.org
In several distributed systems a user should only be able to access data if a user posses a
certain set of credentials or attributes. Currently, the only method for enforcing such policies …

Machine learning based trust computational model for IoT services

U Jayasinghe, GM Lee, TW Um… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The Internet of Things has facilitated access to a large volume of sensitive information on
each participating object in an ecosystem. This imposes many threats ranging from the risks …

Authorization in trust management: Features and foundations

PC Chapin, C Skalka, XS Wang - ACM Computing Surveys (CSUR), 2008 - dl.acm.org
Trust management systems are frameworks for authorization in modern distributed systems,
allowing remotely accessible resources to be protected by providers. By allowing providers …

Semantic web policies–a discussion of requirements and research issues

PA Bonatti, C Duma, N Fuchs, W Nejdl… - The Semantic Web …, 2006 - Springer
Policies are pervasive in web applications. They play crucial roles in enhancing security,
privacy and usability of distributed services. There has been extensive research in the area …

Analyzing GDPR compliance through the lens of privacy policy

J Mohan, M Wasserman, V Chidambaram - … Data Management, Polystores …, 2019 - Springer
With the arrival of the European Union's General Data Protection Regulation (GDPR),
several companies are making significant changes to their systems to achieve compliance …

Access control and the resource description framework: A survey

S Kirrane, A Mileo, S Decker - Semantic Web, 2016 - journals.sagepub.com
In recent years we have seen significant advances in the technology used to both publish
and consume structured data using the existing web infrastructure, commonly referred to as …

[PDF][PDF] Security and trust issues in semantic grids

D Olmedilla, OF Rana, B Matthews… - Dagstuhl Seminar …, 2006 - drops.dagstuhl.de
Grid computing allows sharing of services and resources accross institutions. However,
current Grid security mechanisms for authentication and authorization are too rigid and they …

Driving and monitoring provisional trust negotiation with metapolicies

P Bonatti, D Olmedilla - … on Policies for Distributed Systems and …, 2005 - ieeexplore.ieee.org
We introduce the provisional trust negotiation framework PROTUNE, for combining
distributed trust management policies with provisional-style business rules and access …

Peertrust: Automated trust negotiation for peers on the semantic web

W Nejdl, D Olmedilla, M Winslett - … SDM 2004, Toronto, Canada, August 30 …, 2004 - Springer
Researchers have recently begun to develop and investigate policy languages to describe
trust and security requirements on the Semantic Web. Such policies will be one component …